Suspicious Detection System via Triple DES Algorithm: Cryptography Approach

Size: px
Start display at page:

Download "Suspicious Detection System via Triple DES Algorithm: Cryptography Approach"

Transcription

1 Available Online at International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg RESEARCH ARTICLE ISSN X Suspicious Detection System via Triple DES Algorithm: Cryptography Approach Nisha Rani 1 1 Research Scholar, Department of Computer Science and Engineering, Ganga Institute Of Technology & Management, Kablana ID: nishaparnala@gmail.com Mrs. Neetu Sharma 2 2 HOD (CSE Dept.), Ganga Institute Of Technology & Management, Kablana ID: neetush75@gmail.com Abstract: The paper presents a suspicious detection System which detect suspicious activities. In the paper we proposed the use of cryptography strategies for terrorists detection. Security plays a very important and crucial role in the field of Internet and for communication. So there is a need of suspicious detection system which detects all suspicious activities. The need for Suspicious detection System is increasing due to the rapid usage of communication in the Internet world. Triple Data encryption standard (DES) is a private key cryptography system that provides the security in communication system. By using an Enhanced DES algorithm the security has been improved which is very crucial in the communication and field of Internet. Keywords Cipher text, Decryption, 3DES, Encryption, Plaintext. I. INTRODUCTION is one of the most popular, fastest and cheapest means of communication. It has become a part of everyday life for millions of people, changing the way we work and collaborate. messages can be sent to an individual or groups. A single can spread among millions of people within few moments. Nowadays, most individuals even cannot imagine the life without . For those reasons, has become a widely used medium for communication of terrorists as well. A great number of researchers focused in the area of counterterrorism after the disastrous events of 9/11 trying to predict terrorist plans from suspicious communication. This also motivated us to contribute in this area. 2015, IJCSMC All Rights Reserved 552

2 In this paper, we have applied Cryptography techniques to detect suspicious s, i.e., an that alerts of upcoming terrorist events. We have applied Triple DES (Data Encryption Standard) algorithms, emphasizing initially on Given a plaintext message, the first key is used to DES- encrypt the message. The second key is used to DES-decrypt the encrypted message. (Since the second key is not the right key, this decryption just scrambles the data further.) The twice-scrambled message is then encrypted again with the first key to yield the final cipher text. This three-step procedure is called triple-triple-des is just DES done three times with two keys used in a particular order. (Triple-DES can also be done with three separate keys instead of only two. In either case the resultant key space is about 2^112.) Detecting Suspicious and criminal activities prior to the attacks and providing security to the people is the challenging task for the investigators or administrator . is a technology that includes passing and sending information from one place to another, using computer and the Internet. It is beneficial in both our personal and professional life. As Electronic mail is largely used by the terrorists for their communication, there is a need for Suspicious detection system that classifies s to detect Suspicious activities and make the administrator alert. In this paper work, we will detect the suspicious mails sent from the users who are already registered on this System. Firstly new users sign up themselves on the site to send the mails to those users who already registered and then view the messages from the registered users. Triple DES Algorithm used by admin to encrypt the messages sent to the users or sent some warnings about the other users suspicious activity. In this work, suspicious words dictionary is used to detect the suspicious words which are not actually used in the normal messaging or communication. Suspicious Detection System Suspicious detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails. The proposed work will helps in finding out anti social elements. This provides the security to system which adapts it. This also helps the intelligence bureau, crime branch etc.insurance premium calculations, for quarterly, half yearly and annually is completely automated gives us a reliable environment. The system provides claim reporting and status enquiry. The proposed work will be helpful for identifying the suspicious and also assist the investigators to get the information in time to take effective actions to reduce the criminal activities. 2015, IJCSMC All Rights Reserved 553

3 II. RELATED WORK The research in the area of analysis usually focuses on two areas namely: traffic analysis and content analysis. A lot of research has been conducted for traffic analysis [10], [11]. In the Year 2005 Keila and Skillicorn [11] have investigated on the Enron [13] data set which contains communications among employees of an organization who were involved in the collapse of the organization. The authors [11] have applied ID3 algorithm to detect suspicious s by using keyword base approach and by applying rules. They have not used any information regarding the context of the identified keywords in the s. In the Year 2007 S. Appavu & R. Rajaram [2] have applied association rule mining to detect suspicious s with the additional benefits of classifying the (suspicious in terms of terror plots) s further into specialized classes such as suspicious alert or suspicious info. This system decides whether the can be classified as suspicious alert in the presence of suspicious keyword in the future tense otherwise only it is classified as suspicious info. In the Year 2008 The authors [13], [14] incorporated feature selection strategies along with classification systems. According to [15], by using feature selection methods one can improve the accuracy, applicability, and understandability of the learning process. Selvakuberan et al. [14] have applied filtered feature selection methods [16] on web page classification; according to their results the evaluator CfsSubset Eval yields better performance with search methods Best First, Ranker search, and Forward selection. Pineda-Bautista et al. [17] proposed a method for selecting the subset of features for each class in multi-class classification task. The classifiers that were used by the authors were Naïve Baye's (NB) [6], k-nearest Neighbors (k-nn) [17], C4.5 [19], and Multi Layer Perceptron (MLP). The authors trained the classifier for each class separately by using only the features of that particular class. In the Year Smith 2007 [15]have emphasized the use of a feature selection method for achieving accuracy of sentiment classification. They proposed to apply CfsSubset Eval with the Best First search method. Different researcher used different method to implement a System that detect suspicious activities. The Proposed method used cryptography algorithm i.e. triple DES (3 Data Encryption standard) it is very fast algorithm for encrypt or decrypt the information ( message) in a successful rate. 2015, IJCSMC All Rights Reserved 554

4 We will detect the suspicious mails sent from the users who are already registered on this website. Firstly new users sign up themselves on the site to send the mails to those users who already registered and then view the messages from the registered users. Triple DES Algorithm used by admin to encrypt the messages sent to the users or sent some warnings about the other users suspicious activity. In this proposed work, suspicious words dictionary is used to detect the suspicious words which are not actually used in the normal messaging or communication. A. Triple DES Algorithm (3DES) 3DES is an enhancement of DES; it is 64 bit block size with 192 bits key size. In this standard the Encryption method is similar to the one in the original DES but applied 3 times to increase the encryption Level. Triple DES is DES three times. It comes in two flavors: One that uses three keys, and other that uses two keys. The Idea of 3-DES is shown in to the fig.1. The plain text block P is first encrypted with a key K1, then encrypted with second key K2, and finally with third key K3, where K1, K2 and K3 are different from each other. To decrypt the cipher text C and obtain the plain text, we need to perform the operation P= DK3 (DK2 (DK1 )). But in Triple DES with two keys the algorithms works as follows: [1] Encryption the plain text with key K1. Thus, we have EK1 (p). [2] Decrypt the output of step1 above with key K2. Thus, we have DK2 (EK1 (P)). [3] Finally, encrypt the output of step 2 again with key K1.Thus, we have EK1 (DK2 (EK1 (P))). The idea of 3-DES with two keys are shown in fig , IJCSMC All Rights Reserved 555

5 (Triple DES) III. PROBLEM STATEMENT The problem under consideration is to identify s that contain suspicious contents indicating terrorism events. We consider the task of suspicious detection as a System. The purpose is to formulate a System that detects suspicious activities. We cannot deny the importance of that is a major source of communication among most individuals and organizations, including terrorists and terrorist organizations. The proposed system first detect the suspicious activities when suspicious user send some suspicious message to another user and then delete that message which is basically going through , IJCSMC All Rights Reserved 556

6 The is marked as suspicious when certain keywords like bomb, attack, RDX are present in message. These keywords are inserted by Administrator by creating the data dictionary. IV. Study of Cryptography Technique Encryption: The process of encoding the plaintext into cipher text is called Encryption. Decryption: The process of decoding ciphers text to plaintext is called Decryption. This can be done by two techniques symmetric-key cryptography and asymmetric key cryptography. Symmetric key cryptography involves the usage of the same key for encryption and decryption. Asymmetric key cryptography involves the usage of one key for encryption and another, different key for decryption. V. IMPLEMENTATION DETAILS In this research work we have used triple Des algorithm to implement suspicious detection system. We have created two modules for this work. a) Admin Module. b) User Module. 2015, IJCSMC All Rights Reserved 557

7 These modules also carry sub-modules. a) Admin Module: i. Admin Login ii. Check Suspicious Mails for Admin iii. Data Dictionary for Admin iv. View Data Dictionary for Admin v. View User List for Admin vi. Create message Module for Admin b) User Module i. User Login ii. User Registration Module iii. Create Message Module for Users iv. Inbox Module for Users v. Sent Box Module for Users vi. User Forum a) Admin Module: In Admin module, admin can check all the suspicious mail which is send by suspicious users. He can view the data dictionary, see the user detail which is registered in this system as well as send the message to user. i) Admin Login In this module, admin can enter the username and password to authenticate himself to access the account panel modules. ii) Check Suspicious Mails for Admin In this module, admin can check the suspicious mail which is not actually stored into the user inbox instead of marked as suspicious status and sent it to the admin as suspicious mails with the user details. iii) Data Dictionary for Admin In this module, admin can add the suspicious words into existing data dictionary to detect more precisely and accurately the suspicious mails sent by the users. iv) View Data Dictionary for Admin In this module, admin can view the suspicious words exists into the data dictionary and also has access to delete the suspicious words from the existing data dictionary of suspicious words. 2015, IJCSMC All Rights Reserved 558

8 v) View Users List for Admin In this module, admin can view the registered users and their full details and has access to delete the users if any of the registered users are found to do the suspicious activity on the website. vi) Create message Module for admin In this module, admin can select the username and then enter the message along with the subject and also the input encryption key which is used for encrypt the message as well as the subject and then send it to the selected user and message and subject are both stored into the user inbox. b) User Module: In this, user can send message to another user and that message will be encrypt in some way by using some key. When user(sender) send message to another user he has to enter their name, subject, key, and type their message. id is already registered at the time of user registration. Then that key will be send to the user(receiver) gmail inbox. He can see their key and the decrypt their message and see the message. So, the main benefit of this system it provides security as well as suspicious mails and suspicious user can easily identified. Platform To implement a system, we have used Programming Language Advanced Java; NetBeans as a front end IDE, MySQL Server as a database for storing data and supported Operating System are WINDOWS XP & its above versions. SCREENSHOTS Suspicious detection system 2015, IJCSMC All Rights Reserved 559

9 Login module Admin Account Panel Check suspicious s 2015, IJCSMC All Rights Reserved 560

10 Message Panel Create suspicious words User List Module Compose message module for admin 2015, IJCSMC All Rights Reserved 561

11 Show message panel 2015, IJCSMC All Rights Reserved 562

12 User Login Module Registration Module Create message module for user 2015, IJCSMC All Rights Reserved 563

13 Sent box message module for user User Forum Module VI. CONCLUSION The proposed System is solved the problem definition by detecting the suspicious mails. Admin is created the data dictionary of suspicious words and this data dictionary makes help to detect the suspicious activity of the users. Admin further will be added the suspicious words into the existing Suspicious Words data dictionary. References [1] S.Appavu alias Balamurugan, Aravind,Athiappan, Bharathiraja,Muthu Pandian and Dr.R.Rajaram, Association Rule Mining for Suspicious Detection: A Data Mining Approach, in Proc. Of the IEEE International Conference on Intelligence and Security Informatics, New Jersey,USA, 2007, pp [2] P.S.Keila and D.B.Skillicorn, Detecting unusualand Deceptive Communication in , Technical reports June, [3] S.Appavu and R.Rajaram, Suspicious Detection via Decision Tree: A Data Mining Approach, in Journal of Computing and Information Technology CIT 15, 2007,2, pp , IJCSMC All Rights Reserved 564

14 [4] S.Appavu, R.Rajaram, G.Athiapan, M.Muthupandian, Data Mining Techniques for Suspicious Detection: A Comparative Study. Presented in IADIS European Conference DataMining 2007, pp [5]R.Agrawal, R.J.Bayardo and R.Srikant. Athena, Mining-based interactive management of text databases, In Proc. 7thInt. Conf. Extending Database Technology, Konstanz, Germany, 2000, pp [6] R.B.Segal and J.O.Kephart, MailCat: An Intelligent Assistant for Organizing , in the Proc. of 3 rd Int. Conf. on Autonomous Agents. [7] R.Agrawal and R.Srikant, Fast algorithms for mining association rules, In Proc. 20 th Int. Conf. Very Large Databases, pp , Santiago, Chile, [8] Liu, W. Hsu, and Y. Ma, Integrating classification and Data Mining, pages 80-86, New York City, NY, August [9] X. Yin, J. Han, CPAR: Classification based on predictive Association Rules, SDM 03, pages [10] A.A.Zaidan, B.B.Zaidan, Novel Approach for High Secure Data Hidden in MPEG Video Using Public Key Infrastructure, International Journal of Computer and Network Security, 2009, Vol.1, No.1, ISSN: , P.P [11] A.W.Naji, A.A.Zaidan, B.B.Zaidan, Shihab A, Othman O. Khalifa, Novel Approach of Hidden Data in the (Unused Area 2 within EXE File) Using Computation between Cryptography and Steganography, International Journal of Computer Science and Network Security (IJCSNS), Vol.9, No.5, ISSN: , pp [12] Anas Majed Hamid, Miss Laiha Mat Kiah, Hayan.T. Madhloom, B.B Zaidan, A.A Zaidan, Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis, International Journal of Engineering and Technology (IJET), Published by: Engg Journals Publications, ISSN: , Vol.1,NO.2,P.P [13] K.Selvakuberan, M.Indradevi, R.Rajaram, (2008). Combined feature selection and classification A novel approach for categorization of web pages. Journal of Information and Computing Science. 32pp [14] A. Arauzo-Azofra, J. M. Benitez, Empirical Study of Feature Selection Methods in Classification, In proc. of Eighth Internation Conference on Hybrid Intelligent System s, 2008, pp [15] K. T. Durant, M. D. Smith Predicting t he political sentiment of web log post s using supervised machine learning techniques coupled with feature selecion".lncs, 2007, pp [16]A.A.Zaidan, B.B.Zaidan, Anas Majeed, "High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm", World Academy of Science Engineering and Technology(WASET), Vol.54, ISSN: , P.P [17] A.A.Zaidan, Fazidah. Othman, B.B.Zaidan, R.Z.Raji, Ahmed.K.Hasan,and A.W.Naji," Securing Cover-File without Limitation of Hidden Data Size Using Computation between Cryptography and Steganography", World Congress on Engineering 2009 (WCE), The2009 International Conference of Computer Science and Engineering, Proceedings of the International Multi Conference of Engineers and Computer Scientists 2009, ISBN: , Vol. I, p.p [18] M.Abomhara, Omar Zakaria, Othman O. Khalifa,A.A.Zaidan, B.B.Zaidan, Enhancing Selective Encryption for H.264/AVC Using Advance Encryption Standard, International Journal of Computer and Electrical Engineering (IJCEE), ISSN: ,Vol.2, NO.2, April2010, Singapore. 2015, IJCSMC All Rights Reserved 565

Overview: Main Fundamentals for Steganography

Overview: Main Fundamentals for Steganography 158 Overview: Main Fundamentals for Steganography Zaidoon Kh. AL-Ani, A.A.Zaidan, B.B.Zaidan and Hamdan.O.Alanazi Abstract The rapid development of multimedia and internet allows for wide distribution

More information

Advanced Spam Detection Methodology by the Neural Network Classifier

Advanced  Spam Detection Methodology by the Neural Network Classifier Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015, SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification

More information

Correlation Based Feature Selection with Irrelevant Feature Removal

Correlation Based Feature Selection with Irrelevant Feature Removal Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Image Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission

Image Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.194

More information

PERFORMANCE OF CIPHERING AN AUDIO AND VIDEO IN ADHOC NETWORK M. Radha 1, S. Irudhaya Ananthi 2, K. Rani 3

PERFORMANCE OF CIPHERING AN AUDIO AND VIDEO IN ADHOC NETWORK M. Radha 1, S. Irudhaya Ananthi 2, K. Rani 3 PERFORMANCE OF CIPHERING AN AUDIO AND VIDEO IN ADHOC NETWORK M. Radha 1, S. Irudhaya Ananthi 2, K. Rani 3 1 Dept of Computer Science, Jayaraj Annapackiam College for Women (autonomous), Periyakulam (Taluk),

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Data Store and Multi-Keyword Search on Encrypted Cloud Data

Data Store and Multi-Keyword Search on Encrypted Cloud Data Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Secured Way of Ciphering Text Using Audio Steganography

Secured Way of Ciphering Text Using Audio Steganography Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Cued Click Point Technique for Graphical Password Authentication

Cued Click Point Technique for Graphical Password Authentication Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

II. IMAGE PAGE WITHIN PORTABLE EXECUTABLE FILE

II. IMAGE PAGE WITHIN PORTABLE EXECUTABLE FILE Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques A.W. Naji*, Shihab A. Hameed,, B.B.Zaidan**, Wajdi

More information

Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain

Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1105

More information

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information

Secure Parallel Processing on Encryption Cloud Data Using Fully Homomorphic Encryption

Secure Parallel Processing on Encryption Cloud Data Using Fully Homomorphic Encryption Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

A Hybrid Method of Hiding The Text Information Using Stegnography

A Hybrid Method of Hiding The Text Information Using Stegnography A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com

More information

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

Security in Voip Network Using Neural Network and Encryption Techniques

Security in Voip Network Using Neural Network and Encryption Techniques 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Security in Voip Network Using Neural Network and Encryption Techniques Ashwini Galande

More information

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING ABSTRACT: Video data hiding is still an important research topic due to the design complexities involved. We propose a

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 e-issn (O): 2348-4470 p-issn (P): 2348-66 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May-17 Comparaitive Analysis

More information

Enhancing the Efficiency of Radix Sort by Using Clustering Mechanism

Enhancing the Efficiency of Radix Sort by Using Clustering Mechanism Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels

Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels Richa Jain 1, Namrata Sharma 2 1M.Tech Scholar, Department of CSE, Sushila Devi Bansal College of Engineering, Indore (M.P.),

More information

SECURED ONLINE MATRIMONIAL SYSTEM

SECURED ONLINE MATRIMONIAL SYSTEM Journal homepage: www.mjret.in ISSN:2348 6953 SECURED ONLINE MATRIMONIAL SYSTEM Akshay Baheti, Abhilash Gonpalliwar, Ajay Date, Yuvraj Deokar Department of Computer Engineering Marathwada Mitra Mandals

More information

REMOVAL OF REDUNDANT AND IRRELEVANT DATA FROM TRAINING DATASETS USING SPEEDY FEATURE SELECTION METHOD

REMOVAL OF REDUNDANT AND IRRELEVANT DATA FROM TRAINING DATASETS USING SPEEDY FEATURE SELECTION METHOD Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

A Supervised Method for Multi-keyword Web Crawling on Web Forums

A Supervised Method for Multi-keyword Web Crawling on Web Forums Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Challenges of Hidden Data in the Unused Area Two within Executable Files

Challenges of Hidden Data in the Unused Area Two within Executable Files Journal of Computer Science 5 (11): 890-897, 2009 ISSN 1549-3636 2009 Science Publications Challenges of Hidden Data in the Unused Area Two within Executable Files A.W. Naji, A.A. Zaidan and B.B. Zaidan

More information

A Novel Feature Selection Framework for Automatic Web Page Classification

A Novel Feature Selection Framework for Automatic Web Page Classification International Journal of Automation and Computing 9(4), August 2012, 442-448 DOI: 10.1007/s11633-012-0665-x A Novel Feature Selection Framework for Automatic Web Page Classification J. Alamelu Mangai 1

More information

Cryptography Functions

Cryptography Functions Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)

More information

An Effective Performance of Feature Selection with Classification of Data Mining Using SVM Algorithm

An Effective Performance of Feature Selection with Classification of Data Mining Using SVM Algorithm Proceedings of the National Conference on Recent Trends in Mathematical Computing NCRTMC 13 427 An Effective Performance of Feature Selection with Classification of Data Mining Using SVM Algorithm A.Veeraswamy

More information

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Enhancing DES Using Local Languages C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Abstract: Network services and internet plays vital role in transmitting information from source to destination.

More information

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,

More information

Design and Analysis of New Symmetric Block Cipher Algorithm

Design and Analysis of New Symmetric Block Cipher Algorithm Design and Analysis of New Symmetric Block Cipher Algorithm KALAICHELVI V && MANIMOZHI K Asst. Professor, SRC- SASTRA University, Kumbakonam, India E-mail: kalaichelvi2k@yahoo.com Abstract Cryptography

More information

Detect Covert Channels in TCP/IP Header using Naive Bayes

Detect Covert Channels in TCP/IP Header using Naive Bayes Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.881

More information

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3 www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 May, 2014 Page No. 5594-5599 DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING

More information

FUFM-High Utility Itemsets in Transactional Database

FUFM-High Utility Itemsets in Transactional Database Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

Text Classification for Spam Using Naïve Bayesian Classifier

Text Classification for  Spam Using Naïve Bayesian Classifier Text Classification for E-mail Spam Using Naïve Bayesian Classifier Priyanka Sao 1, Shilpi Chaubey 2, Sonali Katailiha 3 1,2,3 Assistant ProfessorCSE Dept, Columbia Institute of Engg&Tech, Columbia Institute

More information

Expert System to Detect Suspicious Words in Online Messages for Intelligence Agency Using FP-growth Algorithm

Expert System to Detect Suspicious Words in Online Messages for Intelligence Agency Using FP-growth Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 7, July 2015, pg.103

More information

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN. Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS

More information

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

Mining User - Aware Rare Sequential Topic Pattern in Document Streams

Mining User - Aware Rare Sequential Topic Pattern in Document Streams Mining User - Aware Rare Sequential Topic Pattern in Document Streams A.Mary Assistant Professor, Department of Computer Science And Engineering Alpha College Of Engineering, Thirumazhisai, Tamil Nadu,

More information

A New Technique to Optimize User s Browsing Session using Data Mining

A New Technique to Optimize User s Browsing Session using Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

MEMORY EFFICIENT WDR (WAVELET DIFFERENCE REDUCTION) using INVERSE OF ECHELON FORM by EQUATION SOLVING

MEMORY EFFICIENT WDR (WAVELET DIFFERENCE REDUCTION) using INVERSE OF ECHELON FORM by EQUATION SOLVING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC Vol. 3 Issue. 7 July 2014 pg.512

More information

A METHOD TO DETECT PACKET DROP ATTACK IN MANET

A METHOD TO DETECT PACKET DROP ATTACK IN MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

ISSN Vol.04,Issue.05, May-2016, Pages:

ISSN Vol.04,Issue.05, May-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG

More information

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number

Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color

More information

AN ENHANCED HIGH LEVEL USER AUTHENTICATION AND DATA SECURITY USING BIOMETRIC INPUT

AN ENHANCED HIGH LEVEL USER AUTHENTICATION AND DATA SECURITY USING BIOMETRIC INPUT AN ENHANCED HIGH LEVEL USER AUTHENTICATION AND DATA SECURITY USING BIOMETRIC INPUT P.Kannan*, Karthikeyan.P** School of Information Technology and Engineering, VITUniversity.Vellore pkarthikeyan@vit.ac.in,

More information

Encryption and Forensics/Data Hiding

Encryption and Forensics/Data Hiding Encryption and Forensics/Data Hiding 1 Cryptography Background See: http://www.cacr.math.uwaterloo.ca/hac/ For more information 2 Security Objectives Confidentiality (Secrecy): Prevent/Detect/Deter improper

More information

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT: CRYPTOGRAPHY AND NETWORK SECURITY K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 1 Email:lakshmikpriya3698@gmail.com, 2 Email:rubhapandian@gmail.com, 3 Email:niranjanamurugan@gmail.com, Nadar Saraswathi College

More information

CSCE 813 Internet Security Symmetric Cryptography

CSCE 813 Internet Security Symmetric Cryptography CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability

More information

K Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39

K Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39 A Modified Feistel Cipher Involving a Key as a Multiplicant on Both the Sides of the Plaintext Matrix and Supplemented with Mixing, Permutation, and Modular Arithmetic Addition 1 V.U.K. Sastry, 2 K. Anup

More information

Finger Print Enhancement Using Minutiae Based Algorithm

Finger Print Enhancement Using Minutiae Based Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm

Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm ISSN : 0974 5572 International Science Press Volume 9 Number 40 2016 Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm D. Anitha a S. Aruna a Mathew a K. Mathew a and Devilal

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

DOWNLOAD OR READ : MONTHLY REVIEW OF THE U S BUREAU OF LABOR STATISTICS VOLUME 3 PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : MONTHLY REVIEW OF THE U S BUREAU OF LABOR STATISTICS VOLUME 3 PDF EBOOK EPUB MOBI DOWNLOAD OR READ : MONTHLY REVIEW OF THE U S BUREAU OF LABOR STATISTICS VOLUME 3 PDF EBOOK EPUB MOBI Page 1 Page 2 monthly review of the u s bureau of labor statistics volume 3 monthly review of the pdf

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

T-Alert: Analyzing Terrorism Using Python

T-Alert: Analyzing Terrorism Using Python T-Alert: Analyzing Terrorism Using Python Neha Mhatre 1, Asmita Chaudhari 2, Prasad Bolye 3, Prof. Linda John 4 1,2,3,4 Department of Information Technology,St. John College Of Engineering and Management.

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,

More information

Sanitization Techniques against Personal Information Inference Attack on Social Network

Sanitization Techniques against Personal Information Inference Attack on Social Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,

More information

Disquisition of a Novel Approach to Enhance Security in Data Mining

Disquisition of a Novel Approach to Enhance Security in Data Mining Disquisition of a Novel Approach to Enhance Security in Data Mining Gurpreet Kaundal 1, Sheveta Vashisht 2 1 Student Lovely Professional University, Phagwara, Pin no. 144402 gurpreetkaundal03@gmail.com

More information

Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network

Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION

MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION Vinothini T 1, Rajesh I 2, Kirupa Rani D 3 1 PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 2 Associate

More information

ISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at:

More information

ISSN: Page 320

ISSN: Page 320 A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar

More information

A Methodology for Assigning Access Control to Public Clouds

A Methodology for Assigning Access Control to Public Clouds Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

HYBRIDIZED MODEL FOR EFFICIENT MATCHING AND DATA PREDICTION IN INFORMATION RETRIEVAL

HYBRIDIZED MODEL FOR EFFICIENT MATCHING AND DATA PREDICTION IN INFORMATION RETRIEVAL International Journal of Mechanical Engineering & Computer Sciences, Vol.1, Issue 1, Jan-Jun, 2017, pp 12-17 HYBRIDIZED MODEL FOR EFFICIENT MATCHING AND DATA PREDICTION IN INFORMATION RETRIEVAL BOMA P.

More information

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

A Novel Identification Approach to Encryption Mode of Block Cipher Cheng Tan1, a, Yifu Li 2,b and Shan Yao*2,c

A Novel Identification Approach to Encryption Mode of Block Cipher Cheng Tan1, a, Yifu Li 2,b and Shan Yao*2,c th International Conference on Sensors, Mechatronics and Automation (ICSMA 16) A Novel Approach to Encryption Mode of Block Cheng Tan1, a, Yifu Li 2,b and Shan Yao*2,c 1 Science and Technology on Communication

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 7 Cryptographic Systems 2012 Cisco and/or its affiliates. All rights reserved. 1 Explain how cryptology consists of cryptography (encoding messages) and

More information

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH

More information

InfraGard User Guide

InfraGard User Guide InfraGard User Guide Table of Contents I. Logging into InfraGard....... pg. 3 II. User Account Functions a. Change Password... pg. 5 b. View and Update Profile Information... pg. 7 c. Update Privacy Settings.

More information

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An Abstract Cloud security is an evolving sub-domain of computer and network security. Cloud platform utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is Heroku. In

More information

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Improving Service Credibility in Password Authentication Peer Service

Improving Service Credibility in Password Authentication Peer Service Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.216

More information

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E Amandeep Singh, Manu Bansal Abstract - Data Security is an important parameter for the industries. It can be achieved by Encryption

More information

Using Data Mining to Determine User-Specific Movie Ratings

Using Data Mining to Determine User-Specific Movie Ratings Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Keywords APSE: Advanced Preferred Search Engine, Google Android Platform, Search Engine, Click-through data, Location and Content Concepts.

Keywords APSE: Advanced Preferred Search Engine, Google Android Platform, Search Engine, Click-through data, Location and Content Concepts. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advanced Preferred

More information

Best Customer Services among the E-Commerce Websites A Predictive Analysis

Best Customer Services among the E-Commerce Websites A Predictive Analysis www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issues 6 June 2016, Page No. 17088-17095 Best Customer Services among the E-Commerce Websites A Predictive

More information

Using Association Rules for Better Treatment of Missing Values

Using Association Rules for Better Treatment of Missing Values Using Association Rules for Better Treatment of Missing Values SHARIQ BASHIR, SAAD RAZZAQ, UMER MAQBOOL, SONYA TAHIR, A. RAUF BAIG Department of Computer Science (Machine Intelligence Group) National University

More information

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),

More information

Automated Survey Analysis System

Automated Survey Analysis System Automated Survey Analysis System Prof. Arti Bhore 1, Mr V.V. Mane 2, Mr S.B. Poul 3,Mr V.G. Patil 4,Mr S.S. Patil 5 Asst. Professor,Dept. of Computer Engineering, TCOER, Pune, India 1 Student,Dept. of

More information

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) Ayman Wazwaz 1, Khalil Abu-haltam 2, Sawan Atawneh 2, Areej Idaes 2, Dalal Salem 2 1 Electrical Engineering Department, Palestine Polytechnic

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key

Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Amol D. Tupkar 1, Prof. U.A. Rane 2 1 P.G. student (M.E. Digital Electronics), SSGMCE. Shegaon, SGB Amravati University, Maharashtra,

More information

TAMPERPROOF QUESTION PAPERS-AN APPLICATION USING VISUAL CRYPTOGRAPHY SCHEMES

TAMPERPROOF QUESTION PAPERS-AN APPLICATION USING VISUAL CRYPTOGRAPHY SCHEMES Chapter 5 TAMPERPROOF QUESTION PAPERS-AN APPLICATION USING VISUAL CRYPTOGRAPHY SCHEMES 5.1 Introduction This chapter explains new applications of tamperproof preparation and transmissions of online question

More information

Writer Recognizer for Offline Text Based on SIFT

Writer Recognizer for Offline Text Based on SIFT Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1057

More information

Improved Frequent Pattern Mining Algorithm with Indexing

Improved Frequent Pattern Mining Algorithm with Indexing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.

More information

Vol. 1, Issue VIII, Sep ISSN

Vol. 1, Issue VIII, Sep ISSN Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,

More information